Tor, software for mesh networks, tunneling hacks, and encryption packages serve to fight control and privacy invasion. For example, Facebook Tunnel (https://github.com/matiasinsaurralde/facebook-tunnel) hopefully should never actually be used, but it serves as a statement for network neutrality.